Vulnerability Details : CVE-2020-1762
An insufficient JWT validation vulnerability was found in Kiali versions 0.4.0 to 1.15.0 and was fixed in Kiali version 1.15.1, wherein a remote attacker could abuse this flaw by stealing a valid JWT cookie and using that to spoof a user session, possibly gaining privileges to view and alter the Istio configuration.
Products affected by CVE-2020-1762
- cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:kiali:kiali:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-1762
1.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-1762
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
7.0
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H |
2.2
|
4.7
|
Red Hat, Inc. | |
8.6
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H |
3.9
|
4.7
|
NIST |
CWE ids for CVE-2020-1762
-
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
-
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2020-1762
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1762
1810387 – (CVE-2020-1762) CVE-2020-1762 kiali: ignoring JWT claim fieldsIssue Tracking;Third Party Advisory
-
https://kiali.io/news/security-bulletins/kiali-security-001/
Kiali: Service mesh observability and configurationMitigation;Vendor Advisory
Jump to